Behavioral task
behavioral1
Sample
ddd7392f2c3f567ff4af6f55e3af1967d4575768696a998dc6f333b0230ef5c7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ddd7392f2c3f567ff4af6f55e3af1967d4575768696a998dc6f333b0230ef5c7.exe
Resource
win10v2004-20230220-en
General
-
Target
57410d53be4f733f285706c744dc84d4.bin
-
Size
37KB
-
MD5
7817d3205771c17d5ba6909f059ad766
-
SHA1
5a1449b21e4563dc9cc76097d7a43a29a8aa048d
-
SHA256
faf136afc1185b2d4d5b0eb3e7ee299322b1b987dda0332ab10eb1a308da6fbb
-
SHA512
fecd5d05f754a40c2b99fc83aac9fc177bb72a6978943688a5c18ba956f01c0b96800b3b41d834f71c86b586f7bd02319e6a1090918db4239c005980c1a5bbfe
-
SSDEEP
768:gL5mt0lfyetEzmYJC1DA2Cu9VL/xWoxzS72HBCCxj1D:g9flEiH1k1u9VIoxS72HBLD
Malware Config
Signatures
-
Sodinokibi family
-
Sodinokibi/Revil sample 1 IoCs
resource yara_rule static1/unpack001/ddd7392f2c3f567ff4af6f55e3af1967d4575768696a998dc6f333b0230ef5c7.exe family_sodinokobi
Files
-
57410d53be4f733f285706c744dc84d4.bin.zip
Password: infected
-
ddd7392f2c3f567ff4af6f55e3af1967d4575768696a998dc6f333b0230ef5c7.exe.exe windows x86
Password: infected
1da9bd2a660139c2d8ce0baa10e11ec5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
SetEndOfFile
CloseHandle
CreateThread
GetModuleHandleW
GetProcAddress
LoadLibraryA
CopyFileW
MoveFileW
GetStdHandle
CreateFileW
WriteFile
OutputDebugStringW
LeaveCriticalSection
QueryPerformanceFrequency
HeapAlloc
HeapFree
GetProcessHeap
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetCurrentThread
SetThreadAffinityMask
lstrlenW
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
WriteConsoleW
QueryPerformanceCounter
EnterCriticalSection
IsProcessorFeaturePresent
user32
DialogBoxParamW
EndDialog
GetDlgItem
SetDlgItemInt
SetDlgItemTextW
CheckDlgButton
IsDlgButtonChecked
EnableWindow
SetWindowTextW
wsprintfW
MessageBoxW
SendMessageW
gdi32
CreateFontW
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hjl Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ